You may have noticed recently that Comcast and a number of ISPs have started to fight with Google and Mozilla after the makers of Chrome and Firefox announced that they were going to start support the use of DNS over HTTPS (DOH) and DNS Over TLS (DOT) recently
Well boys and girls after a lot of thinking, consideration, and discussion with my family, I’ve decided that it is time to call it a day with my career in the military.
Well kids, it’s one again time for the release of this years Warrant Officer promotion board results. First, I’d like to congratulate the Army for getting them out before the effective date of those promotions.
So you probably didn’t notice (hopefully didn’t) but Signal-Chief recently made a move. About a month ago, I was checking my email when I got a notice from GoDaddy.
Brought to you by the same group that thought that thought that Jeff and Tina were the way to get us to be cyber aware has now released their “Identity Awareness, Protection, and Management Guide”.
Yesterday HRC released MILPER message 19-233 which announced applications for the Computer Network Operations Development Program (CNODP) class of 2023. For those of you not familiar with it, CNODP is the Army’s school for training future cyber tool developers. CNODP is comprised of the System and Network Interdisciplinary Program (SNIP), the Global Network Exploitation and Vulnerability Analyst (GNEVA) Development Program (GDP), and the Joint Cyber Development Program (JCDP).
Let me preface this by saying this post has absolutely NOTHING to do with anything related remotely to the Military or anything technical. Over the 4th of July holiday, me and the family went Disneyland. I love classic Disney. I’m a believer that classic things should not be updated unless there is a compelling reason.
This weekend the Guardian released the latest set of secrets contained from the Edward Snowden document drop. While it contained several revelations, perhaps the most disturbing is a secret program called Submarine Hunting Aquatic Response Killer.
I was doing some research for my firewall project that I wrote about the other day and wanted to add some system monitoring. I figured that the server that I host signal-chief off of didn’t currently have any monitoring going so I would use that (cause why test in the lab when you can test in production?). The system I decided to use was Tripwire which is an opensource project that is part of the Epel Linux repo. I put this together with help from a couple of different tutorials that I found online and combined.
This post is probably going to be updated a few times as it’s a work in progress as I figure things out. As I’ve noted before a few times, I like to write things out as I figure them out so that I don’t have to research time and again. Today’s project, replacing a pfSense firewall with a Centos server and Firewalld.